Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process

Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Nerijus Morkevičius
{"title":"Technical Threat Intelligence Analytics: What and How to Visualize for Analytic Process","authors":"Robertas Damaševičius, Jevgenijus Toldinas, Algimantas Venčkauskas, Šarūnas Grigaliūnas, Nerijus Morkevičius","doi":"10.1109/IEEECONF49502.2020.9141613","DOIUrl":null,"url":null,"abstract":"Visual Analytics uses data visualization techniques for enabling compelling data analysis by engaging graphical and visual portrayal. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. We present a survey of visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody's Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process. We summarize our analysis as a high-level model of visual analytics for cybersecurity threat analysis.","PeriodicalId":186085,"journal":{"name":"2020 24th International Conference Electronics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 24th International Conference Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEECONF49502.2020.9141613","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Visual Analytics uses data visualization techniques for enabling compelling data analysis by engaging graphical and visual portrayal. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide useful decision support. We present a survey of visual analytics tools and methods in the domain of cybersecurity. We explore and discuss Technical Threat Intelligence visualization tools using the Five Question Method. We conclude the analysis of the works using Moody's Physics of Notations, and VIS4ML ontology as a methodological background of visual analytics process. We summarize our analysis as a high-level model of visual analytics for cybersecurity threat analysis.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
技术威胁情报分析:分析过程可视化是什么以及如何可视化
可视化分析使用数据可视化技术,通过图形化和可视化描述实现引人注目的数据分析。在网络安全领域,令人信服的数据可视化表示能够确定有价值的观察结果,从而使领域专家能够构建有效的网络攻击缓解策略并提供有用的决策支持。我们提出了在网络安全领域的可视化分析工具和方法的调查。我们使用五问题方法探索和讨论技术威胁情报可视化工具。我们使用穆迪的物理符号和VIS4ML本体作为可视化分析过程的方法论背景,总结了对作品的分析。我们将我们的分析总结为网络安全威胁分析的可视化分析的高级模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cross-Border Coordination between International Mobile Telecommunications System and Aeronautical Telemetry System in the 1429–1518 MHz Frequency Band Modelling Corona Discharge Characteristic in Electricity Transmission Lines for Fault Detection System MQTT Algebraic Formal Modelling Using ACP Modelling a Leaf and Spine Topology for VM Migration in Fog Computing Propagation Losses Algorithm Development for Wireless Sensor Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1